אדריכלות ישראלית - גיליון 128

G5 technology אדריכלות ישראלית Architecture of Israel #128 February 2022 | | 26 Pho Joy from Chóngqìng, China was kidnapped when he was six years old. He was found at the age of 33 thanks to a face recognition camera that compared photos supplied by his father when he was kidnapped, and photos he himself sent to the ׳'Baby Come Home' web page. Acting under the title of Extended Social Engineering, face recognition systems collect important data from security cameras on every street, railway station, airport and border checkpoint, in order to monitor masses of unaware passersby. As a result, what was regarded as 'science fiction' until not long ago has become an accepted tool for gathering personal information for commercial and security purposes, under a legal permit. It is an algorithmic processing of data collected by recognition cameras, from car numbers (in parking lots), through fingerprints to open doors, and computers in smart home systems. The advantages of the system as a tool for saving time and manpower, are clear and understandable. But as with any double-edged sword, the implications for the protection of privacy enshrined in the Basic Law of Human Dignity and Liberty cry out with a deafening shriek. For this, G5 is the state of the art technology, designed to provide extremely fast data processing, greater reliability, massive network capacity that allows for increased availability and simultaneous multiple users. Like previous generations, G5 technology works in geographic locations denoted 'cells' in which all the wireless devices are connected to the Internet and telephone through radio waves via local antennas. And this is where optical fiber networks come into play, replacing the outdated copper wire networks, and allowing for simultaneously a large number of devices operating at five times the speed even in crowded areas. food for thought G5 technology and the vulnerability of smart home devices Dr. Ami Ran The problem is, unlike copper cables where intrusions can be detected relatively easily, it is very difficult to track intrusions into optical networks, which occur mainly at endpoints such as wiring cabinets, usually located in the public space. Installation of the optical networks is carried out by Cellcom, which provides service to four competing commercial companies that generate huge capital from the process: Bezeq, Hot, Cellcomand Partner - semi-monopolistic entities that have access to government databases. Against this background, it is important to remember that the deployment of fiber optic networks and G5 technology are being promoted by the Ministry of Communications, claiming that this will contribute to the national productivity while comparing Israel to other advanced countries. However, a nationwide network of security and monitoring cameras is already in place, in order to improve control over everything that happens in the public space, and, at the same also in very private ones. Using the G5 technology, tens of thousands of security cameras scattered throughout the country are able to process about 30,000 portraits per minute, while intruding on the privacy of millions of innocent passers-by. Assuming that the intention is fundamentally good - such in the cases of automatic opening of barriers in parking lots using cameras for identifying vehicle plates - this accumulation of confidential information invades public privacy. And no less serious is the unsupervised leaking of personal information to commercial entities, which already make use of digital information stored by public bodies in every possible way - starting with filling out online forms, and in the very near future (if not already) using direct technology Face Recognition cameras for building databases for marketing purposes. With good reason, a memorandum was recently published for 'public comments' on the preparation of a bill concerning the establishment and operation of a national array of face recognition cameras to be operated by the police, security forces, and other governmental institutions. It is no coincidence that the memorandum does not specify what are the 'identifying details' and in what procedure they might be omitted. Needless to say that if the law is approved, the term 'privacy' will finally lose its meaning. Aware of the problem, Amazon, Microsoft and IBM announced about a year ago that they were stopping the sale of police identification software in theUS, and called for federal regulation of the technology. To date, Congress has not approved any law regulating the use of facial recognition software, although other locator software is used by various security agencies, mainly to identify participants in mass demonstrations. Here in Israel, locator software has been operating openly or covertly for years, and has recently also been officially validated as a legitimate means of tracking potential Corona infections. Whatever the reason, the legality of using facial recognition cameras does not interfere with the accelerated promotion of the development of smart surveillance devices by commercial companies, security bodies or local user authorities. These are already using cameras for managing urban systems through artificial intelligence such as regulating traffic lights, traffic congestion and car parks. It is important to note that compared to the Ministry of Communications, which encourages the use of G5 technology and the deployment of optical networks accordingly, local authorities are against it, since the transmission range of G5 networks is smaller than that of previous generations, and it requires more antennas in order to achieve optimal coverage of the broadcast areas. It is important to note that the (obsessive)

RkJQdWJsaXNoZXIy MjgzNzA=